{"id":11287,"date":"2020-09-04T01:46:19","date_gmt":"2020-09-04T01:46:19","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=11287"},"modified":"2026-04-17T18:07:48","modified_gmt":"2026-04-17T18:07:48","slug":"websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/","title":{"rendered":"WebSphere Remote Code Execution Vulnerability (CVE-2020-4534) Threat Alert"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\"> 1. Vulnerability Description<\/h2>\n\n\n\n<p>On July 31, 2020, Beijing time, IBM released a security bulletin which addressed a remote code execution vulnerability (CVE-2020-4534) in WebSphere Application Server (WAS). The vulnerability is caused by improper handling of UNC paths. An authenticated local attacker could exploit the vulnerability to execute arbitrary code. The vulnerability has a CVSS score of 7.8.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>The vulnerability (CVE-2020-4534) was discovered and reported to IBM by NSFOCUS Security Labs. Experts said that the vulnerability could be exploited in combination with the vulnerability (CVE-2020-4450) reported by NSFOCUS to IBM, which allowed an unauthenticated attacker to execute arbitrary code on a target server and gain system privileges, thereby taking over the server. Affected users are advised to fix the vulnerability to mitigate the risks incurred by it.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"957\" height=\"366\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0904-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11288\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0904-1.jpg 957w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0904-1-300x115.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0904-1-768x294.jpg 768w\" sizes=\"(max-width: 957px) 100vw, 957px\" \/><\/figure><\/div>\n\n\n\n<p>Reference links:<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.ibm.com\/support\/pages\/node\/6255074\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.ibm.com\/support\/pages\/node\/6254980\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">2. Scope of Impact<\/h2>\n\n\n\n<p><strong>Affected versions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>WebSphere Application Server 9.0<\/li><li>WebSphere Application Server 8.5<\/li><li>WebSphere Application Server 8.0<\/li><li>WebSphere Application Server 7.0<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">3. Check for the Vulnerability<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Version Check<\/strong><\/li><\/ul>\n\n\n\n<p>Users can choose IBM Installation Manager-&gt; Update to view the installed software packages and revisions and check whether the patch PH26092 is installed. If information about the patch is found, the users are not affected by the vulnerability.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"603\" height=\"462\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0904-2-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11290\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0904-2-1.jpg 603w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0904-2-1-300x230.jpg 300w\" sizes=\"(max-width: 603px) 100vw, 603px\" \/><\/figure><\/div>\n\n\n\n<p>Alternatively, users can search for PH26083 in the installed.xml file under the Installation Manager directory and check whether the patch is installed. If information about the patch PH26083 is found, the users are not affected by the vulnerability.<\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\">4. Mitigation<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">4.1 Official Fix<\/h3>\n\n\n\n<p>Currently, the vendor has released patches to fix the vulnerability and provided security patches to the versions for which official support is no longer available. Affected users are advised to install the patches as soon as possible.<\/p>\n\n\n\n<p>Affected users can upgrade with IBM Installation Manager by applying the patch PH26083 as prompted.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"648\" height=\"484\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0904-4-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11295\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0904-4-1.jpg 648w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0904-4-1-300x224.jpg 300w\" sizes=\"(max-width: 648px) 100vw, 648px\" \/><\/figure><\/div>\n\n\n\n<p>Users can also download and install the patches from the official website of IBM.<\/p>\n\n\n\n<p>Link for downloading the patches: https:\/\/www.ibm.com\/support\/pages\/node\/6254980<\/p>\n\n\n\n<p><strong>Note: Please disable the WebSphere service before installing the patches and start the service after patch installation.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4.2 Protection with NSFOCUS Products<\/strong><\/h3>\n\n\n\n<p>Users of NSFOCUS Network Intrusion Prevention System (NIPS) and NSFOCUS Network Intrusion Detection System (NIDS) can upgrade to the latest versions by installing rule update packages, in order to detect and protect against vulnerability exploits. The following table lists rule base versions of security products:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Product<\/strong><\/td><td><strong>Rule Base Version<\/strong><\/td><td><strong>Download Link<\/strong><\/td><td><a><strong>Rule ID<\/strong><\/a><strong><\/strong><\/td><\/tr><tr><td><strong>NIPS, NIDS<\/strong><strong><\/strong><\/td><td>5.6.10.23150<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/107144<\/td><td>[24981] CVE-2020-4534; &nbsp; [24980] CVE-2020-4450<\/td><\/tr><tr><td>5.6.9.23150<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/107143<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS<\/h2>\n\n\n\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n\n\n\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA). A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>1. Vulnerability Description On July 31, 2020, Beijing time, IBM released a security bulletin which addressed a remote code execution vulnerability (CVE-2020-4534) in WebSphere Application Server (WAS). The vulnerability is caused by improper handling of UNC paths. An authenticated local attacker could exploit the vulnerability to execute arbitrary code. The vulnerability has a CVSS score [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10561,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[746],"class_list":["post-11287","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-websphere"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WebSphere Remote Code Execution Vulnerability (CVE-2020-4534) Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WebSphere Remote Code Execution Vulnerability (CVE-2020-4534) Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"1. Vulnerability Description On July 31, 2020, Beijing time, IBM released a security bulletin which addressed a remote code execution vulnerability\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-04T01:46:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/cover1.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"WebSphere Remote Code Execution Vulnerability (CVE-2020-4534) Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"1. Vulnerability Description On July 31, 2020, Beijing time, IBM released a security bulletin which addressed a remote code execution vulnerability\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/cover1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"WebSphere Remote Code Execution Vulnerability (CVE-2020-4534) Threat Alert\",\"datePublished\":\"2020-09-04T01:46:19+00:00\",\"dateModified\":\"2026-04-17T18:07:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\\\/\"},\"wordCount\":653,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/cover1.jpg\",\"keywords\":[\"WebSphere\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\\\/\",\"name\":\"WebSphere Remote Code Execution Vulnerability (CVE-2020-4534) Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/cover1.jpg\",\"datePublished\":\"2020-09-04T01:46:19+00:00\",\"dateModified\":\"2026-04-17T18:07:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/cover1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/cover1.jpg\",\"width\":418,\"height\":295,\"caption\":\"Lock and globe on digital background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WebSphere Remote Code Execution Vulnerability (CVE-2020-4534) Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WebSphere Remote Code Execution Vulnerability (CVE-2020-4534) Threat Alert - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/","og_locale":"pt_BR","og_type":"article","og_title":"WebSphere Remote Code Execution Vulnerability (CVE-2020-4534) Threat Alert - NSFOCUS","og_description":"1. Vulnerability Description On July 31, 2020, Beijing time, IBM released a security bulletin which addressed a remote code execution vulnerability","og_url":"https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2020-09-04T01:46:19+00:00","article_modified_time":"2026-04-17T18:07:48+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/cover1.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"WebSphere Remote Code Execution Vulnerability (CVE-2020-4534) Threat Alert - NSFOCUS","twitter_description":"1. Vulnerability Description On July 31, 2020, Beijing time, IBM released a security bulletin which addressed a remote code execution vulnerability","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/cover1.jpg","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"WebSphere Remote Code Execution Vulnerability (CVE-2020-4534) Threat Alert","datePublished":"2020-09-04T01:46:19+00:00","dateModified":"2026-04-17T18:07:48+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/"},"wordCount":653,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/cover1.jpg","keywords":["WebSphere"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/","name":"WebSphere Remote Code Execution Vulnerability (CVE-2020-4534) Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/cover1.jpg","datePublished":"2020-09-04T01:46:19+00:00","dateModified":"2026-04-17T18:07:48+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/cover1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/cover1.jpg","width":418,"height":295,"caption":"Lock and globe on digital background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/websphere-remote-code-execution-vulnerability-cve-2020-4534-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"WebSphere Remote Code Execution Vulnerability (CVE-2020-4534) Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=11287"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11287\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/10561"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=11287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=11287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=11287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}